|
Description
|
|
Aung Khant has discovered multiple vulnerabilities in Etano, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed to e.g. the "email", "email2", "f4_zip", and "agree" POST parameters in processors/join.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed to e.g. the "st" parameter in photo_search.php is not properly sanitised within the "create_pager2()" function in includes/sco_functions.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
3) Input passed to the "return" parameter in photo_view.php (when "id" is valid) is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 1.2.2. Other versions may also be affected.
|